Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15115: Missing Authorization in Petlibrio Smart Pet Feeder Platform

0
Medium
VulnerabilityCVE-2025-15115cvecve-2025-15115
Published: Sat Jan 03 2026 (01/03/2026, 23:33:02 UTC)
Source: CVE Database V5
Vendor/Project: Petlibrio
Product: Smart Pet Feeder Platform

Description

CVE-2025-15115 is an authentication bypass vulnerability in the Petlibro Smart Pet Feeder Platform affecting versions up to 1. 7. 31. The flaw arises from improper OAuth token validation in the social login system, allowing unauthenticated attackers to impersonate any user by sending crafted requests to the /member/auth/thirdLogin endpoint with arbitrary Google IDs and phoneBrand parameters. This enables attackers to obtain full session tokens and gain unauthorized account access without valid OAuth verification. The vulnerability has a CVSS 4. 0 score of 6. 9, indicating medium severity, with network attack vector, no required privileges, and no user interaction needed. Although no known exploits are currently reported in the wild, the potential for unauthorized control over user accounts poses risks to confidentiality and integrity of user data and device control. European organizations using Petlibro smart pet feeders could face privacy breaches and unauthorized device manipulation.

AI-Powered Analysis

AILast updated: 01/11/2026, 21:26:40 UTC

Technical Analysis

CVE-2025-15115 is a medium-severity authentication bypass vulnerability identified in the Petlibro Smart Pet Feeder Platform, specifically affecting versions up to 1.7.31. The root cause is a flaw in the OAuth token validation process within the platform's social login system. Attackers can exploit this by sending crafted HTTP requests to the /member/auth/thirdLogin endpoint, supplying arbitrary Google IDs and phoneBrand parameters. Due to insufficient verification of OAuth tokens, the platform erroneously grants full session tokens to unauthenticated users, effectively bypassing authentication controls. This allows attackers to impersonate any user, gaining unauthorized access to their accounts and potentially controlling their smart pet feeders. The vulnerability is exploitable remotely over the network without requiring any privileges or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N) reflects that the attack is network-based, easy to exploit, and does not require authentication or user interaction, but the impact on confidentiality and integrity is limited to the compromised accounts and devices. No patches or known exploits are currently reported, but the flaw represents a significant risk to user privacy and device security. The vulnerability highlights the importance of robust OAuth token validation and secure implementation of third-party authentication mechanisms in IoT platforms.

Potential Impact

For European organizations and consumers using the Petlibro Smart Pet Feeder Platform, this vulnerability could lead to unauthorized access to user accounts, resulting in privacy breaches and potential manipulation of smart pet feeders. Attackers gaining control over these devices could disrupt pet feeding schedules, cause distress to pet owners, or use the compromised accounts as pivot points for further attacks within home or organizational networks. While the direct impact on critical infrastructure is low, the breach of personal data and device control undermines user trust and may lead to reputational damage for vendors and service providers. Additionally, compromised devices could be leveraged as part of larger botnets or for lateral movement in connected home environments. The medium severity score reflects that while the vulnerability does not directly impact system availability or critical infrastructure, the ease of exploitation and lack of authentication requirements make it a notable risk for privacy and device integrity in European markets where smart pet feeders are adopted.

Mitigation Recommendations

Immediate mitigation should focus on monitoring and restricting access to the /member/auth/thirdLogin endpoint, including implementing rate limiting and anomaly detection to identify suspicious authentication attempts. Organizations and users should apply vendor-provided patches as soon as they become available to address the OAuth token validation flaw. In the interim, disabling social login features or restricting them to verified OAuth tokens can reduce exposure. Vendors should enhance OAuth token validation by verifying token signatures, issuer claims, and expiration times rigorously before granting session tokens. Implementing multi-factor authentication (MFA) for account access can further mitigate unauthorized access risks. Security teams should audit logs for unusual login patterns and educate users about potential phishing attempts exploiting this vulnerability. Network segmentation of IoT devices and limiting their access to critical networks can reduce the impact of compromised devices. Finally, vendors should conduct comprehensive security reviews of third-party authentication integrations to prevent similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-27T01:46:47.690Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6959a9dfdb813ff03e731c97

Added to database: 1/3/2026, 11:44:31 PM

Last enriched: 1/11/2026, 9:26:40 PM

Last updated: 2/3/2026, 2:25:26 PM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats